Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Simpliest network access by active directory group with native MS client?

    Scheduled Pinned Locked Moved General pfSense Questions
    pfsense
    7 Posts 4 Posters 885 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G
      gek
      last edited by

      Hello!
      Please advice me.

      I need to make a connection from multiple users to private network according by Active Directory group membership over the existing smb network.

      I see a couple of solutions but they aren't suitable:

      1. OpenVPN with AD auth. -> fine but there is no native client in windows.
      2. IPSEC+L2TP+mobile clients -> i have tried that several times in previous pfsense versions but no success.
      3. ISAKMP + mobile clients + AD authentication -- is it possible? is it a working solution ?

      May be there is any other solutions?

      1 Reply Last reply Reply Quote 0
      • stephenw10S
        stephenw10 Netgate Administrator
        last edited by

        You should be able to use mobile IKEv2 with EAP-Radius as shown here:
        https://www.netgate.com/docs/pfsense/vpn/ipsec/ikev2-with-eap-radius.html#eap-radius-with-windows-network-policy-server-nps

        Steve

        1 Reply Last reply Reply Quote 0
        • G
          gek
          last edited by

          @stephenw10 Thank you for advice.
          But there is may only be a maximum of 50 RADIUS clients as Windows Server Standard Edition.
          Is there way to escape radius authentication and use only active directory authentication instead ?

          1 Reply Last reply Reply Quote 0
          • stephenw10S
            stephenw10 Netgate Administrator
            last edited by

            Not using IKEv2. LDAP doesn't support the hashed passwords sent by the EAP types we have. I guess you would need EAP-GTC but that is considered weak.
            For standard xauth types you have to use IKEv1.

            Or change the Windows server version.

            Steve

            1 Reply Last reply Reply Quote 0
            • M
              Mats
              last edited by

              I haven't tested it myself but winradius might help with that 50 user limit

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate
                last edited by

                You would probably still be afoul of the M$ CALs somewhere.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                M 1 Reply Last reply Reply Quote 0
                • M
                  Mats @Derelict
                  last edited by

                  @derelict

                  I say that's a constant regardless of what you do :)

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.